Since 2002, over 100 on-staff engineers have been developing our patented and unique technologies into comprehensive solutions for data and device security. Over 1,000 customers, including nuclear power plants, government agencies, financial organizations, and dozens of OEM technology vendors such as Cisco, F5, Dell, and HP, leverage our technology to secure their devices and networks from advanced malware.

Download a brochure to learn more

Data Sanitization

OPSWAT developed the most advanced data sanitization (CDR) engines on the market, protecting organizations from threats in productivity files. Data sanitization improves productivity and operations by making malware-infected files usable again. OPSWAT ‘s Content Disarm and Reconstruction (CDR) technology, eliminates potentially insecure aspects of files and reconstructs them with their original functionality.

Multi-scanning

We combine multiple anti-malware engines into one platform, giving organizations the most robust technology for reducing exposure time to new outbreaks and accounting for detection limitations in single engines. OPSWAT is a leader in improving anti-malware efficacy, essentially pioneering the concept of scanning files with multiple anti-malware engines to achieve better security.

Highlights:

Variable scanning packages with over 30 anti-malware engines based on security needs

Vulnerability Engine

The Vulnerability Engine is the first step in identifying applications that could be targeted by malware. This unique patent-pending technology correlates vulnerabilities to binaries to provide fast, accurate vulnerability assessments for thousands of applications including Microsoft PowerPoint, Adobe Acrobat, Java, and Skype.

Highlights:

Support for over 1 million binaries, 15K applications, and approximately 10K CVEs

Workflow Engine

The Workflow Engine allows organizations to customize user security profiles and processing for different file types and sources. Our technology, including data sanitization and the Vulnerability Engine, offers unparalleled flexibility because the Workflow Engine lets end-users define how they want to handle data and user security. For example, external files can be processed differently than internal files, users can be required to follow certain criteria depending on their security clearance, and file types can be processed differently based on rule definitions.

Highlights:

Support for over 400 million workflow combinations for users, devices, and network sources

Built-in load balancing for analysis scale

Ability to apply different security policies across accounting, marketing, and IT departments

Endpoint Assessment Security

OPSWAT’s endpoint assessment technology is the gold standard for ensuring that endpoints remain compliant and secure prior to the access of business-critical resources on-premises or in the cloud. OPSWAT’s technology reports on endpoint device data such as device information (Hostname, MAC/IP Address), and device security status as indicated by the presence and status of installed anti-malware, anti-phishing, public file sharing, and disk encryption applications.

Cloud-Based Threat Intelligence

With extensive visibility into the latest application vulnerabilities and malware techniques through its broad endpoint footprint, OPSWAT’s core technology includes a unique threat intelligence platform in the cloud that unifies proprietary and third-party security data. OPSWAT brings its unique view of binary and IP reputation, vulnerability data, and malware together in a fast and accessible API-based delivery model to organizations consuming threat intelligence for advanced security defense.

Highlights:

Performs fastest cloud hash lookup on the market

Leverages more than 40 anti-malware engines and databases

Includes billions of hashes on clean and infected files, consolidated from multiple geographic regions